1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew-mc [135]
2 years ago
15

Is there such a thing as an ethical reason for unauthorized access into a computer system?

Computers and Technology
1 answer:
Anastaziya [24]2 years ago
7 0
Of course there is. On a simple level, consider a parent trying to locate their missing child. Someone might break into their social media accounts to see if there are messages that might help determine their whereabouts.

Consider a website hosting inappropriate pictures of children. Breaking into the server hosting the files and removing them is 100% ethical. 

I'm sure you can think of more examples. 
You might be interested in
You listened to a song on your computer. did you use hardware or software? explain.
scZoUnD [109]
Software, unless you planned on permanently downloading the Music Album or Song to your computer's Hard Drive. i.e, you would use whatever Music or Media player you have installed on your computer, and that simply counts as Software. 
4 0
3 years ago
What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)?
alisha [4.7K]

Answer:

Detection vs Prevention

Explanation:

  • A Network Intrusion Detection System as the name suggests it "detects" the attackers / vulnerabilities existed in the network system / infrastructure.
  • A Network Intrusion Prevention Detection System as the name suggests it "prevents" the attackers from hacking the system. While a detection just detects the abnormalities where as a prevention system can prevent them.
  • The detection system detects the vulnerabilities, security threats and the attackers in the system through the web traffic analyzers and security analyzers.
  • The prevention system prevents the network from being compromised. It tries to regain the access if already compromised.
  • Both the NIDS and NIPS have to be coordinated for the full protection of the network.
8 0
3 years ago
Write down the difference between Application Software and
Tems11 [23]
Without system software, system can not run on the other hand without application software, system always runs
5 0
2 years ago
Diane, a developer, needs to program a logic component that will allow the user to enter a series of values
oee [108]
<h2>The Examples Of Users:</h2>
  • Form
  • Table
  • Query
<h2>The Answers Are:</h2>
  • Formatted summary of information from a database

  • User-friendly interface for adding to or retrieving information from a database

  • Stores raw data in a relational database

  • Retrieves specific information from a database. Can also be used to update, edit, and remove data
<h2>Hope it helps*^-^*All Correct!?</h2>
3 0
2 years ago
Write a method that takes two arguments: two integers. The integers are then squared, added and the result printed on the screen
diamong [38]

Answer:

import java.util.Scanner;

class Main

{

   

     public static void main(String[] args)  

     {

     System.out.println(" Enter the the two numbers:");

     Scanner input = new Scanner(System.in);

     int a = input.nextInt();

     int b = input.nextInt();

     int c = sumsquareFunction(a, b);

     System.out.println("Sum of Square of two numbers are:" + c);

     }

public static int sumsquareFunction(int n1, int n2) {

     int c= n1*n1 + n2*n2;

     return c;  

  }

}

Explanation:

Please check the answer.

6 0
3 years ago
Other questions:
  • What human activity would cause a decrease in the population of another species? (The action of humans would impact one species,
    9·1 answer
  • Behaving in an acceptable manner within a workplace environment is referred to as having
    9·1 answer
  • To place the caption at the top of the image, you will need to change the __________ in the
    5·2 answers
  • What is the first step to creating a PivotTable?
    11·1 answer
  • Select the correct answer.
    8·2 answers
  • Most presentation programs allow you to save presentations so they can be viewed online by saving them as ____
    5·2 answers
  • Which sentence in the passage shows an effective way to protect your document from misuse? Claire has saved her research paper o
    14·1 answer
  • Think about the ways new communication technologies can make certain tasks easier for
    13·1 answer
  • Define two benefits to members of the community of replacing the printed copy with an online version.
    5·1 answer
  • Suppose we used an internet addressing protocol that used 4 bits to encode a single address. How many devices would be supported
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!